Shaarli export of all bookmarks on Tue, 02 Jan 18 06:52:10 -0500
- Building a NAS
- Linux resolutions for 2018 | Network World
- The Best Free Microsoft Office Calendar Templates for the New Year
- IPv6 Address Primer | manski's blog
- Attacking Read-Only Domain Controllers (RODCs) to Own Active Directory – Active Directory Security
- Windows Incident Response: WindowsIR 2017
- Tuning Windows 10 Part 4: Deploying the golden image -
- 5 keys to create a killer CLI in Go
- Packet Crafting with Colasoft Packet Builder
- How to keep ahead of evolving cyber threats – IT Governance Blog
- Writing effective scripts using VMware PowerCLI | Adventures in a Virtual World
- Setting up a Used Tyan S7012 - My Wired House
- Why Employers Must Stop Requiring College Degrees For Middle-Skill Jobs
- BlueMaho v090417 - Bluetooth Security Testing Suite - KitPloit - PenTest Tools for your Security Arsenal ☣
- Healthcare Exchange Standards: HIE Future is Bright - stepping into 2018
- Guide: 1356/1366 Xeon Aftermarket Heatsink Selection/Installation | ServeTheHome and ServeThe.Biz Forums
- +++
- Heatsink for Tyan s7012 inside Supermicro SC826 | ServeTheHome and ServeThe.Biz Forums
- Tyan s7012
- 4 tips for achieving better ISO 27001 audit results – IT Governance Blog
- What’s New in Performance: vSphere 6.5 | Ryan Birk – Virtual Insanity
- “The Spaceship” 2.0 | PeterMarks.info
- Capita legs
- Spaceship Modifications | PeterMarks.info
- Security Planner
- vSphere Troubleshooting Series: Part 6 – Network Troubleshooting | Ryan Birk – Virtual Insanity
- vSphere Troubleshooting Series: Part 5 – Storage Troubleshooting | Ryan Birk – Virtual Insanity
- vSphere Troubleshooting Series: Part 4 – Virtual Machine Troubleshooting | Ryan Birk – Virtual Insanity
- vSphere Troubleshooting Series: Part 3 – vSphere Installation Troubleshooting | Ryan Birk – Virtual Insanity
- vSphere Troubleshooting Series: Part 2 – vSphere Troubleshooting Tools | Ryan Birk – Virtual Insanity
- vSphere Troubleshooting Series: Part 1 – Introduction | Ryan Birk – Virtual Insanity
- In defense of job titles - SysAdmin1138 Expounds
- Six healthy and delicious cookbooks to start the new year off right, top picks under $30 | 9to5Toys
- SQL Vulnerability Assessment now available for SQL Server 2012 and up | SQL Server Security Blog
- SQL Server DBA Morning Health Checks – Sam Lester – SQL Server & BI Premier Field Engineer
- Building a vSphere 6.5 Home Lab
- 2017’s biggest cybersecurity facepalms
- Fsociety Hacking Tools Pack - A Penetration Testing Framework - KitPloit - PenTest Tools for your Security Arsenal ☣
- TeamworkIQ: Automate Processes With Intelligent Checklists. Far Easier Than Workflow Software.
- DHCP Penetration Testing
- OpenStack basics: An overview for the absolute beginner - OpenStack Superuser
- HTTP Security Headers – JP
- Using Elastic Curator To Clean Up ELK – JP
- GitHub - elastic/curator: Curator: Tending your Elasticsearch indices
- Your Mind's Software is More Important Than Its Hardware
- How to Find All Failed SSH login Attempts in Linux
- 2017 Year in Review: The Rise of Kubernetes in the Cloud
- Step-by-Step Guide to Doing a Balance Transfer on Credit Cards
- Understanding Complexity – Bitgenics
- CSIRO PUBLISHING | Journal of Primary Health Care
- Cynefin framework
- How to Solve the Most Common Dishwasher Problems
- A tool to help dashboard creation - virtual red dot
- WPHardening v1.6 - Fortify the security of any WordPress installation - KitPloit - PenTest Tools for your Security Arsenal ☣
- 5 Trends Cybersecurity Practitioners Must Address in 2018
- 2017: The Year of Breaches, Failing PII, and the Voice Movement - Pindrop
- How To Navigate Directories Faster In Linux - OSTechNix
- High Value Scenarios – 4-Step Load Test – Chris’s Performance Testing Blog
- White House Website Moves to WordPress From Drupal
- Cyberattack forces New York State hospital to run on downtime procedures
- DSHR's Blog: Why Decentralize?
- Casteyanqui.com | Electric Vehicles
- Distributing Operational Knowledge Across a Team - via @codeship | via @codeship
- 4 Years After Target, the Little Guy is the Target — Krebs on Security
- 19 Keto Lunches That Will Help You Stick to Your Resolutions
- The Disconnect Between Cybersecurity & the C-Suite
- Password reset - Tiny Tiny RSS
- Hunting Rogue Access Points with the ESP8266 | Hackaday
- How to Configure Linux for Children - Make Tech Easier
- Beyond the Repository: Clinical Benefits of a VNA
- Twinax - Cheap, Cheerful and Annoyingly Chubby - MovingPackets.net
- Auditing Kubernetes for Secure Configurations - Blog | Tenable™
- Kubernetes 101 Fundamentals
- Even With the Cloud, Client Security Still Matters · System Overlord
- Why Healthcare Cybersecurity Spending Is Rising
- Tutorial on how to create a paper and digital offline Bitcoin wallet with Linux - LinuxConfig.org
- PiKarma - Detects Wireless Network Attacks - KitPloit - PenTest Tools for your Security Arsenal ☣
- Temperature and Humidity Sensor | Nbctcp's Weblog
- Happy IR in the New Year! - Securelist
- Fancy Labels and References in LaTeX – texblog
- Viewing YUM variables using python - mikep
- Approaches to International Cyberlaw: A View from Israel - Lawfare
- Restore Corrupted USB Drive To Original State In Linux - LinuxAndUbuntu - Linux News | Apps Reviews | Linux Tutorials HowTo
- How to Install Attendize on Ubuntu 16.04 – RoseHosting Blog
- Building a Hacking Kit with Raspberry Pi and Kali Linux
- The Role of Change Management in Maximizing Health IT Investment
- Get Inspired to Transform Enterprise Imaging [eBook]
- Let Enterprise Imaging Tell the Whole Patient Story
- Protect Your Network With a Bastion Host in Just 3 Steps
- Username Anarchy - Username Tools For Penetration Testing - KitPloit - PenTest Tools for your Security Arsenal ☣
- Qubes OS - A Security-Oriented Operating System - KitPloit - PenTest Tools for your Security Arsenal ☣
- Imaging Technology: 6 Traits Radiologists Should Demand from Vendors
- NHS steps up its cyber security defences – how are you preparing for the NIS Directive? – IT Governance Blog
- GDPR Report: Many organisations have already appointed a DPO – IT Governance Blog
- HOWTO: Automate One-A-Day Photography – Please Work
- How to Effectively Use Storytelling in Sales
- Blog
- Accenture-Cyber-Risk-Convergence-Of-Operational-Risk-And-Cyber-Security.pdf
- hit-ehr-nist-sp1800-1c-draft.pdf
- CISOs Play Rising Role In Business
- Load Balancing Medical Imaging & Information System Protocols - Medical_Imaging_Systems_Deployment_Guide.pdf
- PACS of the Future Tested, Successful | Medical Imaging Talk Blog
- Draft_v7 - dttl-fsi-TransformingCybersecurity-Infographic-2014-02.pdf
- Cognitive Risk Framework for Cybersecurity part II | The GRC Bluebook
- Cognitive Risk Framework for Cybersecurity | The GRC Bluebook
- "Mystery" Buyer Revealed: Swiss National Bank's US Stock Holdings Rose 50% In First Half, To Record $62BN | Zero Hedge
- The Swiss National Bank Owns $80 Billion In US Stocks - Here's The Catch | Zero Hedge
- Test Driving Docker Function as a Service (FaaS)
- Check Adobe Flash version Internet Explorer (Active-X) on Server 2012/2016 and Windows 8.1/10 - renshollanders.nl
- DOS Attack Penetration Testing (Part 2)
- BruteSpray v1.6.0 - Brute-Forcing from Nmap output (Automatically attempts default creds on found services) - KitPloit - PenTest Tools for your Security Arsenal ☣
- DexterPOSH's Blog: Test connectivity via a specific network interface
- DexterPOSH's Blog: PowerShell : Nested Remoting (PSRemoting + PSDirect)
- How to use WinRM & PowerShell with Jenkins
- DexterPOSH's Blog: Vagrant using Hyper-V
- Setting the Default Wallpaper for Windows 10 during ConfigMgr OSD – smsagent
- DexterPOSH's Blog: PowerShell : Retry logic in Scripts
- A CIO Discusses Top 2018 Security Challenges in Healthcare
- DexterPOSH's Blog: PowerShell + AD + Pester : create new user using template Part 2
- DexterPOSH's Blog: PowerShell + AD + Pester : Create new user using template - Day 1
- Parsing the WindowsUpdate.log using PowerShell and regex -
- PowerShell – easily posting scripts to a website while maintaining syntax highlighting by copying as HTML | blog.bjornhouben.com
- Create and reuse a powershell scriptblock - LazyWinAdmin
- Troubleshooting ELK Elasticsearch & Logstash Pt 1 of 2 - Syspanda
- Troubleshooting ELK Elasticsearch & Logstash Pt 2 of 2 - Syspanda
- Security Awareness Training: Step-By-Step - Syspanda
- Logstash Master Script for ELK Health monitoring - Syspanda
- Collecting and sending Windows Firewall Event logs to ELK - Syspanda
- Brocade SAN Switch commands that prove to be very useful | 50mu - about storage
- Free Dell EMC trainings | 50mu - about storage
- Useful EMC VMAX CLI commands | 50mu - about storage
- Return of the Borg: How Twitter Rebuilt Google's Secret Weapon | WIRED
- Graphite
- Prometheus - Monitoring system & time series database
- Script Synchronize all WSUS servers
- Installing and Configuring WSUS with Powershell – smsagent
- Securing Picture Archiving and Communication System | NCCoE
- Difference Between kVA and kW | Difference Between
- microsoftramblings – Stuff I'm trying to figure out about Microsoft products, mainly SCCM (ConfigMgr)
- Patching Production servers with WSUS & Powershell - Syspanda
- Force WSUS to Synchronize Now from PowerShell – PowerShell, Programming and DevOps
- GOSINT - Open Source Threat Intelligence Gathering and Processing Framework - KitPloit - PenTest Tools for your Security Arsenal ☣
- GOSINT
- Virtual machine application runs slower than expected in ESXi (1018206)
- WSUS - Server Clean Up Using Powershell - TechyGeeksHome
- Function Router -- A "CDN" for Serverless, function as a service, functions, lambda, openwhisk
- Function as a Service for Docker – Chanwit Kaewkasi – Medium
- Automated WSUS Maintenance - PowerShell Script (Update 1.6)
- Walkthrough: Building a Windows 10 1709 (Fall Creators Update) Reference Image with Microsoft Deployment Toolkit – Stick To The Script!
- From Zero to 10 – Windows 10 Deployment Round-up – Stick To The Script!
- PowerShell: Create Active Directory Users In Bulk (Update 1.5) – Stick To The Script!
- How to easily Check your SPN and Delegation settings for SQL Server in an Active Directory environment – A Windows System Admin's Blog
- Fixing the randomly stopping WsusPool IIS Application pool and Windows Updates failed 0x80244022 error – A Windows System Admin's Blog
- Get a list of users in Active Directory who have not logged in for specified number of days using PowerShell – A Windows System Admin's Blog
- How to allow an Active Directory Certificate Authority to generate Certificates with a Subject Alternative Name attribute – A Windows System Admin's Blog
- sysadvent: Day 25 - How to choose a data store for the new shiny thing
- Use GMail to send system mails on Debian · The Hacking Memento
- Building And Installing Rockbox · The Hacking Memento
- SW N-Central Trial Form - Gilfoyle
- GitHub - MasashiTeruya/Install-WSUS: This is trivial powershell module to install WSUS(Windows Server Update Services).
- PowerShell: Automated WSUS Maintenance (Update 1.6) – Stick To The Script!
- WSUS – A Windows System Admin's Blog
- Free Tools Library - SDM Software | Configuration Experts
- How to check the PowerShell version & install a new version – Mike F Robbins
- Setting up a Jekyll workflow on windows · Michael McKenna
- VESA Announces DisplayHDR Specification: Defining HDR Capabilities In Performance Tiers
- NVIDIA's AI will help GE speed up medical image processing
- How to retrieve currently applied GPOs on your local machine using WMI via Windows Scripting Host ( WSH ) – Azure Active Directory Developer Support for MS Graph and AAD Graph
- Secure Coding Standards | The CERT Division
- Mitigating the Insider Threat - Building a Secure Workforce - fissea-conference-2012_mahoutchian-and-gelles.pdf
- Insider Threat Best Practices | The CERT Division
- GitHub - google/kubeflow: Machine Learning Toolkit for Kubernetes
- The Housing Bubble Blog » A Repeat Of An Earlier Situation
- Bluepot - Bluetooth Honeypot - KitPloit - PenTest Tools for your Security Arsenal ☣
- @ISACA Volume 24 | 29 November 2017
- Access denied to Administrative (Admin) shares in Windows 8 – 4sysops
- Windows 7 Access Denied For Administrator | Think Like A Computer
- Security Education in Uncertain Times: 2017 in Review | Electronic Frontier Foundation
- PowerShell – Using psexec to automate UI tasks on remote machines – Codingbee
- veewee/installation.md at master · jedi4ever/veewee · GitHub
- DOS Attack Penetration Testing (Part 1)
- Audit/Assurance Programs
- A New Utility for Diagnosing and Repairing Problems with the WMI Service
- (5) T312 Burping for Joy and Financial Gain Tim lanmaster53 Tomes - YouTube
- Group Policy and WMI, A Wonderful Combination - Simple Talk
- (5) Tips and Techniques to Adopt GDPR using COBIT 5 - YouTube
- A Machine Learning Tutorial with Examples | Toptal
- What's New in Visual Paradigm?
- TheHive Project
- Edward Snowden Introduces Baby Monitor for Spies | Hackaday
- iPod 5th gen SSD upgrade - My Wired House
- What is Pulp, Candlepin, Foreman, and Katello – Justin Garrison – Medium
- ServerMonkey Specials | Save Your Banana Peels! | ServerMonkey.com
- Install Katello on CentOS 7 | Lisenet.com :: Linux | Security | Networking
- Deployment Research > Research
- Reviewing auditd logs with Spacewalk | devops-blog
- Taskwarrior - What's next?
- Advice on building Docker images on Windows | devops-blog
- Spacewalk vs. Katello | devops-blog
- osquery Across the Enterprise – Palantir – Medium
- Ins and Outs of Anonymous Access | IT Pro
- 16 Tips for Creating Better Network Diagrams
- Error Message Explained: User Profile Service Failed the Logon • Helge Klein
- Group Policy - GPResult Examples - The Sysadmins
- Driver Automation Script - Automate Driver Downloads/Installation in MS Intune
- How to Back Up and Restore a MySQL Database
- David Clunie's Blog: How many (medical image exchange) standards can dance on the head of a pin?
- Kea With MySQL Cluster Backend – Test Report | Internet Systems Consortium
- Netflix's move to Amazon EC2 - PrudentCloud
- Docker Blog Series Part 5 – Understanding new container management features in Service Fabric – Monub
- SQL Server High Availability Options
- PACSHealth® :: Home
- WhatWaf - Detect And Bypass Web Application Firewalls And Protection Systems - KitPloit - PenTest Tools for your Security Arsenal ☣
- GOWPT - Go Web Application Penetration Test - KitPloit - PenTest Tools for your Security Arsenal ☣
- JexBoss - JBoss (and others Java Deserialization Vulnerabilities) verify and EXploitation Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
- Wazuh - Open Source Host and Endpoint Security - KitPloit - PenTest Tools for your Security Arsenal ☣
- CALDERA - Automated Adversary Emulation System - KitPloit - PenTest Tools for your Security Arsenal ☣
- OWASP ZAP 2.7.0 - Penetration Testing Tool for Testing Web Applications - KitPloit - PenTest Tools for your Security Arsenal ☣
- wildPwn - Brute forcer and shell deployer for WildFly (JBoss AS) - KitPloit - PenTest Tools for your Security Arsenal ☣
- Linux Expl0rer - Easy-To-Use Live Forensics Toolbox For Linux Endpoints - KitPloit - PenTest Tools for your Security Arsenal ☣
- CryKeX - Linux Memory Cryptographic Keys Extractor - KitPloit - PenTest Tools for your Security Arsenal ☣
- How to See Which Group Policies Are Applied to Your PC and User Account
- MyDLP
- OpenSOC · GitHub
- Key Notes on Data Protection in the Cloud | Trevor Templar
- Four mistakes that can kill virtual machine performance
- SOMAP.org - Information Security Governance, Risk and Compliance Tool
- Mohannad hussain dicom and imaging tools
- PacsOne Server DICOM 3.0 Conformance Statement
- Journal Paper Format - 22.pdf
- Avast open-sources its machine-code decompiler
- 2011-dcca-basic-10010160.pdf
- Starting an InfoSec Career – The Megamix – Chapters 4-5 | tisiphone.net
- Moving a LVM Partition from Proxmox to VMWare, lvdisplay mapped size changed, why? | ServerfaultXchanger | QueryXchanger
- Readings | Ethics and the Law on the Electronic Frontier | Electrical Engineering and Computer Science | MIT OpenCourseWare
- Plant-astic Plant Based Meal Plan | Whole Foods Market
- How to get Antivirus information with WMI (VBScript) – Decrypt my World
- Insider Threat Mitigation Guidance - insider-threat-mitigation-guidance-36307
- Baldrige Cybersecurity Excellence Builder v1.0 March 2017 - baldrige-cybersecurity-excellence-builder-v1.0.pdf
- The curious Kabri | Catching up on the IT industry after years in Enterprise IT
- On Attending DefCon – Jon Spraggins
- Metadefender: A More Private Alternative to VirusTotal | OPSWAT Blog
- Setting up Kali Linux in Docker on Windows 10 – Positive Security
- Windows Security Center: Fooling WMI Consumers | OPSWAT Blog
- GitHub - modulogrc/modSIC: Modulo's Open Distributed SCAP Infrastructure Collector, or modSIC, makes it easier for security analysts to scan an environment vulnerabilities based on OVAL-Definitions. It's an open-source service specialized in distributed network assessments.
- Nemsec Cyber Security
- Compliance Features in Office 365 | Office 365 Platform Service Description
- The curious Kabri | Completely free IT training resources to help diversify your IT career
- DICOM introduction and free software
- Easy Keto Lasagna - Hey Keto Mama
- 5 Minute Spicy Tuna Rolls - Hey Keto Mama
- Fhir tooling (grahame)
- Home - Radiolab
- Nasuni-2015-State-of-Cloud-Storage-Report.pdf
- Nasuni-White-Paper-State-of-Cloud-Storage-2013.pdf
- Kong - Open-Source API Management and Microservice Management
- CISSP QOTD
- 8 Largest Group Purchasing Organizations for Hospitals
- mozilla/ssh_scan - A SSH configuration and policy scanner
- Using ElastAlert to Help Automate Threat Hunting – JP
- The Weirdest Programming Principles You've Never Heard Of
- How Should International Law Treat Cyberattacks like WannaCry? - Lawfare
- The IT Security Lessons from 2017
- Active/Passive MySQL High Availability Pacemaker Cluster with DRBD on CentOS 7 | Lisenet.com :: Linux | Security | Networking
- HeRM's - A Commandline Food Recipes Manager - OSTechNix
- Slideshow-Deslidefier
- How to create mobile-friendly documentation | Opensource.com
- sysadvent: Day 22 - Building a secure bastion host, or, 50 ways to kill your server
- Goodbye 2017, Hello 2018: New and Old Cloud Security Challenges
- List of data breaches and cyber attacks in December 2017 – 33.8 million records leaked – IT Governance Blog
- A List of Machine Learning (Ab)use Cases
- Replace broken hard drive in software RAID1 « Technical blog on UNIX, Linux, Android etc.
- Grabber! Like a Petit Pimouss'
- 4 ways Companies can make remote working successful
- Basic Python Script to Log in to Website Using Selenium Webdriver | Lisenet.com :: Linux | Security | Networking
- Must use, must know WinDbg commands, my most used – benjamin perkins
- Wrapping up a year in healthcare: WannaCry, NHS Digital and the General Data Protection Regulation (GDPR) – IT Governance Blog
- Oracle Licensing (R)evolution
- New Year’s resolutions for CISOs | CSO Online
- 2017 Health Data Breach Tally: An Analysis - HealthcareInfoSecurity
- Cyber security professionals lack the training to complete their daily tasks – IT Governance Blog
- Be a More Effective CISO by Aligning Security to ...
- What are the current pain points of osquery? | Trail of Bits Blog
- NBlog - the NoticeBored blog: NBlog December 21 - auditor independence [LONG]
- Monitoring Home Power Consumption for less than $25
- How to Talk to Your Family About Digital Security | Electronic Frontier Foundation
- Cybersecurity tips that are cost-effective and efficient
- How To Tell If Your Linux Server Has Been Compromised
- Linux Foundation Certified Systems Administrator (LFCS) Exam Review #LinuxFoundation @linuxfoundation #Linux #CentOS @sandervanvugt @tecmint #vExpert – vMusketeers
- 2018 Application Performance Management Predictions - Part 3 | APMdigest - Application Performance Management
- 2018 Application Performance Management Predictions - Part 2 | APMdigest - Application Performance Management
- 2018 Application Performance Management Predictions - Part 1 | APMdigest - Application Performance Management
- sysadvent: Day 20 - Regarding the Responsibility of Systems Administrators
- The 10 Best Cybersecurity Books Everyone Should Read
- Windows unquoted search path fix - The Silicon Underground
- Malware hit these 3 verticals the hardest in 2017 - TechRepublic
- Troy Hunt: Fixing Data Breaches Part 3: The Ease of Disclosure
- Troy Hunt: Fixing Data Breaches Part 2: Data Ownership & Minimisation
- Troy Hunt: Fixing Data Breaches Part 1: Education
- Analyse Cisco ASA Firewall Logs with Graylog | Lisenet.com :: Linux | Security | Networking
- How to use Apache reverse proxy as Load Balancer - LinuxTechLab
- Why Siemens sees data privacy as a competitive advantage
- Healthcare Security: Going Beyond ComplianceWebinar.
- HHS Attempts to Clear Up HIPAA Confusion on PHI Release
- Understating Guide of Windows Security Policies and Event Viewer
- Key steps to GDPR compliance – Part 3 – IT Governance Blog
- Free ISO 27001 resources – IT Governance Blog
- Creating a culture of security: Part 2 | CSO Online
- 7 cyber security predictions for 2018 | CSO Online
- Automate OVM deployment for a production ready Oracle RAC 12.2 architecture – (part 02) - Blog dbi services
- Automate OVM deployment for a production ready Oracle RAC 12.2 architecture - (part 01) - Blog dbi services
- Book Recommendation: Oracle Database Upgrade and Migration Methods
- How to Properly Enable HTTPS on Nginx with Let's Encrypt on Ubuntu 16.04/17.10
- Real World Computing: The Year in Review (2017)
- SEI CERT Oracle Coding Standard for Java - SEI CERT Oracle Coding Standard for Java - Confluence
- SEI CERT Coding Standards - Secure Coding - Confluence
- Healthcare Risk Management Key Area in New HITRUST Program
- Disposable Infrastructure Part 1: Building Your Vagrant Control Node
- SPIE_200204117_Workstation.pdf
- GitHub - zentralopensource/zentral: Zentral is a framework to gather, process, and monitor system events and link them to an inventory.
- House committee calls on HHS to improve medical device cybersecurity with supply chain transparency | FierceHealthcare
- Best Practices for Securing Active Directory | Microsoft Docs
- Why Metrics Must Guide Your DevOps Initiative | APMdigest - Application Performance Management
- Detecting Kerberoasting Activity Part 2 – Creating a Kerberoast Service Account Honeypot – Active Directory Security
- Ten Commandments from Entrepreneurial 'Evangelist' Guy Kawasaki - Knowledge@Wharton
- GitHub - morph027/pve-iso-2-pxe: Create PXE bootable Proxmox installation
- VDiscover: large-scale vulnerability discovery using Machine Learning
- SOMAP.org - Security Officers Management and Analysis Project
- Using PowerShell to disable or remove SMB1
- Using PowerShell to test whether hotfixes is installed
- Slides, demos and videos from PowerShell Conference Europe 2017
- janegilring (Jan Egil Ring) · GitHub
- Cross-platform Lightweight Performant Host Visibility
- How to Tune Java Garbage Collection | CUBRID blog
- How to Get Notified When Your Ubuntu Box Needs Security Updates
- Framework Overview ITGIG (update) - 05_Implimenting_NIST_Cybersecurity_Framework_Using_COBIT5_Tom_Conkle.pdf
- All About Stuff: webMethods and other servers Java Memory Settings
- SMART C-CDA Scorecard
- Sokanu
- GitHub - RSS-Bridge/rss-bridge: The RSS feed for websites missing it
- Key Steps to GDPR Compliance – Part 2 – IT Governance Blog
- GDPR Overview
- Penetration tests could have spared NHS from WannaCry – IT Governance Blog
- Mandatory documentation for ISO 22301 – IT Governance Blog
- ISO 22301
- JBoss Performance Tuning part 1
- JBoss AS 7 Performance tuning
- Open Source and Enterprise Architecture: JVM Performance Tuning
- Web design and development articles and tutorials for advent ◆ 24 ways
- COBIT 5 for cyber security: want to know more? – IT Governance Blog
- WMI, Query Windows SecurityCenter2
- The Mirth Open Source Portal
- COBIT vs ITIL vs TOGAF: Which Is Better For Cybersecurity?
- Running Systems » Blog Archive » Connecting EMC/NetApp shelves as JBOD to a Linux machine
- Vendor Management in the Spotlight – The Personal Blog of Sean Goodwin
- Book Review: The Book of Five Rings – The Personal Blog of Sean Goodwin
- My CISSP Success Story – The Personal Blog of Sean Goodwin
- Memory Tuning for Java Application Servers | rsingh
- Packbot-P Summary Design and SOW - ML-advice.pdf
- Virtual Machine Optimization - Userful Support
- Information Security Travel Guide: Tips for Traveling
- Home - Arachni - Web Application Security Scanner Framework
- en – NetApp Monitoring Blog
- SANS Digital Forensics and Incident Response Blog | Automated Hunting of Software Update Supply Chain Attacks | SANS Institute
- WinRM problems – Luka Gros
- Enable nested virtualization on Google Cloud | Open-Source Routing and Network Simulation
- Significant Changes Coming to NIST Cybersecurity Framework
- An introduction to Joplin, an open source Evernote alternative | Opensource.com
- How to Easily Boost Ubuntu 16.04/17.10 Network Performance by Enabling TCP BBR
- How to Transfer Your Steam Games From One PC to Another | iceflatline
- How to optimize your cloud strategy – Azure Government Cloud
- Comparing cloud vs on-premise? Six hidden costs people always forget about
- Install SQL Server 2017 Using PowerShell Desired State Configuration and SqlServerDsc – PowerSQL
- joeware – never stop exploring… :) » Blog Archive » Active Directory… 18 Years Old… But Do Your App Vendors and Developers Even Know How To Use It Properly?
- What You Need To Know About The Intel Management Engine | Hackaday
- 6 open source home automation tools | Opensource.com
- Monitoring Tomcat with Nagios Core and jmx4perl | Lisenet.com :: Linux | Security | Networking
- A few cybersecurity predictions for 2018 | CSO Online
- 5 tips for better NGINX security that any admin can handle - TechRepublic
- Putting Off Plans to Strengthen Data Security? It Could Cost You Your Job
- Docker : My First Steps | The ORACLE-BASE Blog
- 8 Critical 401(k) Questions You Need to Ask Your Employer
- How To Detect And Find Hidden Cameras In Your Airbnb Rental - foXnoMad
- OpenCV Never Forgets a Face | Hackaday
- ize it by match
- vSphere Permission cleanup - LucD notes
- Even unmanaged EdgeMax EdgeRouters can be managed with new UNMS (Ubiquiti Network Management System) free beta, no UniFi required! | TinkerTry IT @ Home
- A Fistful of Dongles: The Glaring Omission in Your Incident Response Planning
- Technical Professions Progress from Magical to Boring
- Wordpress: Redirect HTTP to HTTPS in Apache | UITS Linux Team
- Downloading SharePoint Patches with PowerShell - Todd Klindt's SharePoint Admin Blog
- Henry Ford Health System data breach compromised data of nearly 20,000 patients
- Security Onion Configuration in VMware
- Antifragile Management and the End of the Annual Performance Review » Public Libraries Online
- Why is IT Security winning battles, but losing the war...? - Balabit Blog
- Mecklenberg, N.C. county officials consider paying cyberattacker's ransom demand
- Cybersecurity’s Dirty Little Secret
- Testssl.sh - Testing TLS/SSL Encryption Anywhere on Any Port
- How to manage firewallD (on CentOS 7 and all the other distro) – Marksei
- SQL Vulnerability Assessment Available in SSMS - Thomas LaRock
- PLCs in Your Browser | Hackaday
- 2 Easy Ways to Encrypt Dropbox on Ubuntu 16.04/17.10 (Desktop & Server) | LinuxBabe
- When is a 10-bit A/D an 8-bit A/D? | Hackaday
- Authenticate Oracle database users against AD, in practice – Oracle 48
- How to use DNSenum to scan your server's DNS records - LinuxConfig.org
- Cloudian Announces HyperFile, Makes Object Better | penguinpunk.net
- An Introduction to Machine Learning through Microsoft ML – Microsoft Faculty Connection
- Stability and Change – Why and How to adopt WaaS. – PowerInTheShell
- Cloud Native Part 3: DevOps - via @codeship | via @codeship
- Visualizing your Solutions: Mind Maps and Wireframe Diagrams – DiscoPosse.com
- Encryption’s role in GDPR compliance and cloud data security | ITProPortal
- Kaspersky Security Bulletin: Review of the Year 2017 - Securelist
- Cybersecurity for Electronic Devices | US-CERT
- Holiday Traveling with Personal Internet-Enabled Devices | US-CERT
- On the Demise of Linux Journal - Noah Meyerhans
- In practice: How customers are using Shielded Virtual Machines to secure data | Windows Server Blog
- The best kept secret in cybersecurity for banks | CSO Online
- The Effectiveness of Tools in Detecting the 'Maleficent Seven' Privileges in the Windows Environment - effectiveness-tools-detecting-maleficent-seven-privileges-windows-environment-38220
- WebGoat Teaches You To Fix Web Application Flaws In Real-time - OSTechNix
- Disrupting The Computer Industry Before it Existed: Rear Admiral Grace Hopper | Hackaday
- Seth's Blog: Reading at work
- Roll-up Board - Visual Studio Marketplace
- Protecting Your Website From Application Layer DOS Attacks With mod_evasive
- 6 steps for GDPR compliance | CSO Online
- What is a supply chain attack? Why you should be wary of third-party providers | CSO Online
- Cybersecurity professionals aren’t keeping up with training | CSO Online
- Index of /docs/Slides/2017
- Changing Cybersecurity Regulations that Global Financial Services Firms Need to Know About | CSO Online
- 5 computer security facts that surprise most people | CSO Online
- Department of Defense contractors must implement IT security controls by December 31 | CSO Online
- JPCERT/CC Blog: Research Report Released: Detecting Lateral Movement through Tracking Event Logs (Version 2)
- The first text message was sent 25 years ago
- Sopranica
- sysadvent: Day 2 - Shifting Left Securely With inSpec
- GitHub - cluberti/VDI: Repository for VDI scripts
- Doc Searls Weblog · Requiem for a great magazine
- GitHub - peteheist/irtt: Isochronous Round-Trip Tester
- Seth's Blog: Your soft skills inventory
- Netapp Ontap 9.3 Simulator | SYSADMINTUTORIALS IT TECHNOLOGY BLOG
- Cuckoo’s Egg – Week 3 Notes – Chris Sanders
- Build a SNES Classic with an Android TV Box
- (My) CSSLP Notes – Software Deployment, Operations, Maintenance and Disposal | Adventures in the programming jungle
- CSSLP
- Monthly Security Patch Program for the vCenter Server Appliance - VMware vSphere Blog
- sysadvent: Day 1 - Comfortably Numb - or - “How Corporate Analgesia is Actively Harming You”
- GitHub - f4exb/sdrangel: SDR Rx/Tx software for Airspy, BladeRF, HackRF, LimeSDR, PlutoSDR, RTL-SDR, SDRplay RSP1 and FunCube
- A look back at cybersecurity in 2017 | CSO Online
- First US Federal CISO Shares Security Lessons Learned
- Insider threat — Chemours employee steals trade secrets | CSO Online
- 5 Free or Low-Cost Security Tools for Defenders
- Protect your name: how to secure DNS servers? | CQURE Academy
- Configuring Quad9 on pfSense – Linux Included
- Quad9 – First Thoughts & Benchmarks – Linux Included
- IAB Europe releases GDPR user consent technical standard
- Automate End-to-End Latency Measurements « ipSpace.net by @ioshints
- IDS, IPS Penetration Testing Lab Setup with Snort
- WiFi Hacker- WiFi Hacking Software – InfoSecHotSpot
- Why You Need a Cybersecurity Incident Response Plan (And How to Create One)
- How long to study for CISSP - The Silicon Underground
- Upgrade your SQL Server to scale before adding new hardware – MSSQL Tiger Team
- ASP.NET Session State with SQL Server In-Memory OLTP | SQL Server Database Engine Blog
- Programmatically Creating and Signing Word Documents – Andrew Coates ::: MSFT
- Guest Blog | A Mobile DevOps Retrospective, Part III: Measurement, the Last Mile – Visual Studio App Center Blog
- This Goal Setting Trick Will Help You Stop Procrastinating
- Raible Designs | A Stressful, but Rewarding, Trip to Devoxx Belgium and Morocco
- Building a Frankenstein Tablet | Enginoor
- Are you ready for containers in your office?
- 8 Low or No-Cost Sources of Threat Intelligence
- Cloud Native Part 2: In Practice - via @codeship | via @codeship
- Cloud Native Part 1: Definition | via @codeship
- How to Extract Content from VMDK Files
- The 10 concerns keeping the C-suite up at night going into 2018 - TechRepublic
- Kaspersky Security Bulletin - Story of the year 2017 - Securelist
- NBlog - the NoticeBored blog: ISO27k internal audits for small organizations
- Developers Can Do More to Up Their Security Game: ...
- The Infosec Introvert Travel Blog | tisiphone.net
- AWS re:Invent 2017: Serverless Architectural Patterns and Best Practices - ARC401 - WoodITWork.com
- AWS re:Invent 2017: Security Anti-Patterns: Mistakes to Avoid - FSV301 - WoodITWork.com
- Who Was the NSA Contractor Arrested for Leaking the ‘Shadow Brokers’ Hacking Tools? — Krebs on Security
- 6 fireable offenses that could cost CISOs their jobs
- Antivirus vendors have your data. Can they handle GDPR?
- 4 Ways to Speed Up SSH Connections in Linux
- HDMI 2.1 is here with 10K and Dynamic HDR support
- Linus 'Linux' Torvalds gives security developers guidance | ZDNet
- IoT lottery: finding a perfectly secure connected device - Securelist
- Evil Tester: What is Agile Testing? The Books List
- It’s Bash Scripts All the Way Down (more on CLI versus API) « ipSpace.net by @ioshints
- Practical KRACKs - Koen Van Impe - vanimpe.eu
- What I learned by attending FOR610: Reverse-Engineering Malware / part 1 - Koen Van Impe - vanimpe.eu
- Coinmon - Check Cryptocurrency Prices From Commandline - OSTechNix
- Basic Security Tools for Your Risk Management Program
- Use Philips Hue as an IDS - Koen Van Impe - vanimpe.eu
- Green tea cat-shaped bread - Japan Today
- Monitor your Raspberry Pi cluster with Prometheus and Docker
- Serverless Kubernetes home-lab with your Raspberry Pis
- Using ELK as a dashboard for honeypots
- Service, function and capability (again) – Tom Graves / Tetradian
- What Is Function-as-a-Service (FaaS)?
- Function-as-a-Service Market is Expected to Exceed more than US$ 7.50 Billion By 2021 | Medgadget
- Configuring iptables to log network traffic - Alex Scoble's IT Notes - An Information Technology Blog
- Management Methods | Management Models | Management Theories
- What Is Function-as-a-Service? Serverless Architectures Are Here!
- Kubernetes: Fission: Serverless Functions as a Service for Kubernetes
- Functions as a Service (FaaS)
- Functions as a Service (OpenFaaS) | faas
- Functions as a service: the rise of serverless architecture
- Introducing Functions as a Service (FaaS)
- [Project Description] Securing Picture Archiving and Communication System (PACS): Cybersecurity for the Healthcare Sector | CSRC
- Automating WSUS 2016 Installation with PowerShell - Petri
- Generating patch compliance report from WSUS with PowerShell – microsoftramblings
- PowerShell meets WSUS | JeffOps
- Opensource PACS | Rady's Inspirations
- Active Directory Logon Script – Luka Gros
- PowerShell Server Inventory, Part 3: Viewing the Inventory using a UI | Learn Powershell | Achieve More
- PowerShell Server Inventory, Part 2: Collecting and Sending Data | Learn Powershell | Achieve More
- PowerShell Server Inventory, Part 1: SQL Database Build | Learn Powershell | Achieve More
- GitHub - proxb/ServerInventoryReport: A set of scripts to create an inventory report using PowerShell, SQL and WPF
- How to install Windows Server features using PowerShell – Server 2012 R2 update
- WSUS | Learn Powershell | Achieve More
- How to get a list of every WSUS update using PowerShell | The Angry Technician
- WSUS–PowerShell Reporting – Luka Gros
- Generating HTML Reports in PowerShell – Part 1 – Azure Field Notes Blog
- Dockerizing all the things: Running Ansible inside Docker container – Rule of Tech
- PowerShell – Remove the WSUS client settings from the registry | JeffOps
- PACS Replacements Part 3 – PACS Acceptance Testing « PACS People
- ISACA CGEIT training (Certified in the Governance of Enterprise IT) Courseware
- Q&A: The Ethics of Using Brain Implants to Upgrade Yourself - IEEE Spectrum
- Using Emerging Threats Suricata Ruleset to Scan PCAP
- Understanding IoT Security (Part 1 of 3): IoT Security Architecture on the Device and Communication Layers - DZone IoT
- Understanding IoT Security (Part 2 of 3): IoT Cyber Security for Cloud and Lifecycle Management - DZone IoT
- Securing the Workspace Part 2: A few security basics for your Workspace -
- Bruce Charlton's Notions: Universal institutional bloating, the British Disease (caused by micro-managing bureaucracy = totalitarianism)
- Punctuation Rules Around Quotation Marks
- Samurai stroll - Japan Today
- How to Encrypt USB Drive on Linux Using VeraCrypt - LinuxBabe.Com
- How to Install MKVToolNix 9.6.0 on Ubuntu 16.04 and 16.10 via PPA
- How to Integrate Collabora Online Server with Nextcloud on Ubuntu 16.04
- Tips / Solutions for settings up OpenVPN on Debian 9 within Proxmox / LCX containers | Robert Penz Blog
- WannaCry happened and nobody called me during my vacation – I tell you why | Robert Penz Blog
- Implementing IoT securely in your company – Part 3 | Robert Penz Blog
- Implementing IoT securely in your company – Part 2 | Robert Penz Blog
- Implementing IoT securely in your company – Part 1 | Robert Penz Blog
- How to Install and Use Prey to Protect Your Ubuntu Linux Laptop from Theft - LinuxBabe.Com
- A security expert built an unofficial Wikipedia for the dark web
- Using Telegraf, InfluxDB and Grafana to Monitor Network Statistics · Lindsay Hill
- Healthcare BYOD Security Embraces Cloud, Biometric Authentication
- VMWare Security Model
- Quad9 9.9.9.9 might be a good Google Public DNS 8.8.8.8 alternative, claims better privacy and features DNSSEC, DNS Benchmark indicates better speeds | TinkerTry IT @ Home
- AsciiCam: Make ASCII Art with your Phone | Hackaday
- Rehoming the Hyperconverged Home Lab – Virtually Sober
- Downloading all the 78rpm rips at the Internet Archive | Richard WM Jones
- Keeping a work notebook | Richard WM Jones
- TempestSDR: An SDR tool for Eavesdropping on Computer Screens via Unintentionally Radiated RF
- Why Quality Customer Service Always Starts with a Smile
- STIG Compliance with SCAP and DCM in Configmgr - AnthonyOnAzure
- Configmgr SQL Server Sizing and Optimization - AnthonyOnAzure
- How many disks can you add to a (virtual) Linux machine? | Richard WM Jones
- Risk, Process, and Balance – Russell Ballestrini
- Securely publish Jenkins build artifacts on Salt Master – Russell Ballestrini
- Minikube – Russell Ballestrini
- Selenium grid on Kubernetes – Russell Ballestrini
- Configuration Management and the Golden Image – Russell Ballestrini
- The Three Deployment Management Strategies – Russell Ballestrini
- Configuration Management vs Remote Execution – Russell Ballestrini
- Postfix Salt State Formula – Russell Ballestrini
- How to reset HP iLO Lights-Out User and Password Settings with IPMItool – Russell Ballestrini
- Understanding Salt Stack user and group management – Russell Ballestrini
- Tips for getting pull requests approved – Russell Ballestrini
- My top five suggestions for an independent developer creating a new product or service – Russell Ballestrini
- Create your own fleet of servers with Digital Ocean and salt-cloud – Russell Ballestrini
- Add a custom header to all Salt managed files using pillar and jinja templates – Russell Ballestrini
- How to save hundreds of dollars on groceries without clipping coupons – Russell Ballestrini
- How to rescue logs and config from a failed Citrix NetScaler App Gateway – Russell Ballestrini
- Block cipher lab – Russell Ballestrini
- Career development is a game of chutes and ladders – Russell Ballestrini
- How to capture HTTPS SSL TLS packets with wireshark – Russell Ballestrini
- PowerShell – Find the appropriate network packet (MTU) size
- PowerShell – Is hyperthreading enabled? | JeffOps
- vCenter (VCSA) and using Let's Encrypt for SSL Certificates
- Security Professionals: Yes we appear vulnerable but that attack vector will never happen – Russell Ballestrini
- Hacker Olive Oil Lamp Crafted From Home Materials – Russell Ballestrini
- A system administrators guide to installing and maintaining multiple python environments – Russell Ballestrini
- Python Image Grabber pig.py – Russell Ballestrini
- virt-back: restoring from backups – Russell Ballestrini
- A Deep Dive into InfluxDB - via @codeship | via @codeship
- Darktable for Windows using Vagrant - ZenCoffee Blog
- The Life of Kenneth: Creating an Autonomous System for Fun and Profit
- Seth's Blog: Five contributions
- Healthcare Exchange Standards: HIE Future is bright - Automated not Manual
- Understanding Guide to Nmap Firewall Scan (Part 1)
- 3 Pillars of Cyberthreat Intelligence
- 2017 Hacker Holiday Gift Guide · System Overlord
- 10 Best LaTeX Editors For Linux
- A.J. Baime on Truman’s “Completely Different Avenue of the American Dream” » Public Libraries Online
- Azure Stack Validation Environment – Part 3: Subscriptions – AzureCAT Guidance
- SharePoint Performance Issue – Ahmed Amin
- How to create a self-signed SAN certificate, wildcard certificate vs SAN – benjamin perkins
- DevOps for Data Science – DevOps Maturity – Carpe Datum
- Cloud Computing + Modern DevOps == Productivity Gains – Make it better
- Azure Stack Validation Environment – Part 5: Putting it all together – AzureCAT Guidance
- How we made backups faster with SQL Server 2017 – MSSQL Tiger Team
- Azure Stack Validation Environment – Part 1: Overview – AzureCAT Guidance
- Wednesday Featured Forums: SQL Server – Forum Ninjas
- 5 Lessons to Become a Really Good Self-Taught Programmer
- The 50 Cool Uses for Live CDs
- 12 Raspberry Pi Christmas Projects You Can Make in a Day
- Three things I learned at Devoxx
- As I See It: The Pros and Cons of Doing Nothing - IT Jungle
- Install Windows 10 on Surface 1TB with MDT | Keith's Consulting Blog
- Becoming Your Own ISP, Just for Fun | Hackaday
- Continuous Network Container Security for Docker Containers - NeuVector
- Beautiful blue Raspberry Pi 3 goes on sale, but you (probably) can't buy it
- Why you should consider applying for grad school right now - 80,000 Hours
- MHA - Mail Header Analyzer - KitPloit - PenTest Tools for your Security Arsenal ☣
- Four Ways to Protect Your Backups from Ransomware Attacks
- Shadow IT: The Invisible Network
- NBlog - the NoticeBored blog: NBlog November 14 - 50 best infosec blogs
- Implementing SPF, DKIM, and DMARC – Linux Included
- Testing SPF, DKIM, and DMARC – Linux Included
- NHS needs to develop cyber-sec culture to reap benefits of digitisation
- GitHub - vanhoefm/krackattacks-scripts
- SANS Digital Forensics and Incident Response Blog | 4 Cheat Sheets for Malware Analysis | SANS Institute
- Supplementing Windows Audit, Alerting, and Remediation with PowerShell
- Data Mining in the Dark: Darknet Intelligence Automation
- The State of Honeypots: Understanding the Use of Honey Technologies Today
- Threat Predictions for Industrial Security in 2018 - Securelist
- Threat Predictions for Connected Health in 2018 - Securelist
- New product aims to help with GDPR's 'right to be forgotten'
- GDPR guidance at your fingertips
- General Data Protection Regulation (GDPR) – The Cloud Security Alliance (CSA) has prepared various tools and resources to help both enterprises and cloud service providers comply with the GDPR.
- Is Google Cloud network really better than AWS network ? – Gabe's Blog
- Top Takeaways From the Healthcare Security Summit
- A CISO Sizes Up Healthcare Security Threats for 2018
- Here's How To Get Solid Browser Security [Update 2017]
- Matchup: GDPR and New Zealand's Privacy Act 1993
- Analysis: How Malware Creators Use Spam Emails to Maximize Their Impact
- House Committee Urges HHS Action on Medical Device Risks
- Errata Security: Your Holiday Cybersecurity Guide
- Wisconsin Statewide Health Information Network
- Healthcare Exchange Standards: Extra software/transaction details in FHIR AuditEvent / ATNA Audit Message
- How to Leverage the Rosetta Stone of Information ...
- 20 Years of Protecting Intermediaries: Legacy of 'Zeran' Remains a Critical Protection for Freedom of Expression Online | Electronic Frontier Foundation
- Security Education Companion
- New Guide for Political Campaign Cybersecurity Debuts
- 3 Ways to Retain Security Operations Staff
- We're Still Not Ready for GDPR? What is Wrong With Us?
- 121 Pieces of Malware Flagged on NSA Employee's ...
- Death of the Tier 1 SOC Analyst
- White House Releases New Charter for Using, ...
- Moving Application Authentication to the Operating System
- Fred Kwong: The Psychology of Being a CISO
- Insider Threats: Red Flags and Best Practices
- 2017 Has Broken the Record for Security Vulnerabilities
- Employee training remains the best first line of defense against cybersecurity breaches | CSO Online
- What is penetration testing? The basics and requirements | CSO Online
- The CIO should report to the CISO | CSO Online
- Ransomware damage costs predicted to hit $11.5B by 2019 | CSO Online
- Hacker John Draper banned from DefCon for sexual misconduct
- The cybersecurity skills shortage is an existential threat
- Bay Dynamics Risk Fabric puts vulnerabilities in context | CSO Online
- GDPR: How to Make it a Competitive Advantage | CSO Online
- Building A Perfect Sysmon Configuration File | CQURE Academy
- 11 top tools to assess, implement, and maintain GDPR compliance | CSO Online
- Should we wait for Oracle 19? – Upgrade your Database - NOW!
- Proxy over SSH on Windows, Mac or Linux – – Unixblogger –
- What’s the difference between a ‘Malicious Threat’ and a ‘Careless Insider’? - Balabit Blog
- How to force Windows to start downloading the Windows 10 update files | VentureBeat
- The Thanksgiving Reader by Seth Godin
- 7 useful bcc/BPF performance analysis tools for Linux | Opensource.com
- How To Kill The Largest Process In An Unresponsive Linux System - OSTechNix
- How to improve ROI on automation: 4 tips | The Enterprisers Project
- How to Create Your Own NAS Storage with Openmdediavault
- Boot Linux ISO From Android Phone - LinuxAndUbuntu - Linux News | Apps Reviews | Linux Tutorials HowTo
- How to setup Quad9 DNS on a Linux
- Raspberry Digital Signage | Binary Emotions
- Banana Backups | Linux Journal
- Four Hidden Costs and Risks of Sudo Can Lead to Cybersecurity Risks and Compliance Problems on Unix and Linux Servers | Linux Journal
- InsecRes - A Tool to Find Insecure Resources on HTTPS Sites
- How to audit NTLM? | >_
- Beyond passwords: how human behavior is the next step for security - Balabit Blog
- Pentagon left public intelligence gathering data on exposed server
- Sending netdata metrics through syslog-ng to Elasticsearch - Balabit Blog
- Top 5 Student Loan Debt Tips - Law and Daily Life
- Debian and the GDPR
- Cli.Fyi - Quick And Easy Way To Fetch Information About IPs, Emails, Domains And Lots More - OSTechNix
- The 10 Easiest Ways to Keep Ubuntu System Clean
- adcli – Easy Way To Join RHEL/CentOS System To Active Directory Domain
- Sysadmin 101: Patch Management | Linux Journal
- Harnessing the Power of Cloud Securely
- /r/netsec's Q4 2017 Information Security Hiring Thread : netsec
- Sr. Information Security Vendor Assurance Analyst at UPS • JOFDAV
- CISO Manifesto: 10 Rules for Vendors | LinkedIn
- Cyber-Security, the Continuous Life-Cycle (Part II) | LinkedIn
- The Life-Cycle Process of a Security Gap (Part 1) | LinkedIn
- A CISO's Seven Fundamentals | LinkedIn
- The Strange Art of Writing App Release Notes - IEEE Spectrum